CN107194282A - It is a kind of to can verify that single keyword Top k search methods towards cloud computing - Google Patents

It is a kind of to can verify that single keyword Top k search methods towards cloud computing Download PDF

Info

Publication number
CN107194282A
CN107194282A CN201710225029.3A CN201710225029A CN107194282A CN 107194282 A CN107194282 A CN 107194282A CN 201710225029 A CN201710225029 A CN 201710225029A CN 107194282 A CN107194282 A CN 107194282A
Authority
CN
China
Prior art keywords
document
retrieval result
keyword
code information
verification code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710225029.3A
Other languages
Chinese (zh)
Other versions
CN107194282B (en
Inventor
戴华
朱向洋
杨庚
刘国秀
李啸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN201710225029.3A priority Critical patent/CN107194282B/en
Publication of CN107194282A publication Critical patent/CN107194282A/en
Application granted granted Critical
Publication of CN107194282B publication Critical patent/CN107194282B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

Towards cloud computing single keyword Top k search methods are can verify that the invention discloses a kind of, uploaded including data and Top k retrievals and verification step, data owner encodes (HMAC) mechanism using Hash message authentications, and according to document and the partial ordering relation of the relevance score of keyword, verification code information is constructed, then outsourcing is stored to high in the clouds together with collection of document.Data consumer is when performing list keyword Top k retrievals, and Cloud Server returns to retrieval result collection of document and corresponding verification code information;Data consumer reconstructs identifying code according to the retrieval result of acquisition, realizes the integrity verification for retrieval result.The agreement flow of the present invention is simple, it is easy to accomplish;It is safe, it is able to verify that whether retrieval result document data is maliciously tampered or abandons;The transmission communication cost and reconstruction calculations cost for completing the verification code information of retrieval result integrity verification are low, are conducive to increasing network utilization and recall precision.

Description

It is a kind of to can verify that single keyword Top-k search methods towards cloud computing
Technical field
It is that a kind of can verify that single keyword Top-k retrieval sides towards cloud computing the present invention relates to cloud computing security fields Method.
Background technology
With the maturation of cloud computing technology, with the cloud service mould for representative such as Amazon EC2, Google App Engine Formula is rapidly developed and application popularization.Resource outsourcing to the clouds such as increasing enterprises and individuals will be by that will store, calculating take Provider (Cloud Service Provider, Cloud Server P) is engaged in cut operating costs.The thought of IT resource services Become increasingly popular, the trend of " all are all serviced " (X as a Service, XaaS) is presented, " service " turns into the core of cloud computing Concept.But while cloud computing flourishes, the problem of cloud security also turns into by extensive concern.In cloud computing environment, User is out of hand to the data being placed in Cloud Server (Cloud Server, Cloud Server) and calculating, is for data It is no be protected, whether calculating task is executed correctly can not all determine, it is therefore desirable to design corresponding security mechanism and system Structure protects the confidentiality and integrity of user data.The former mainly realizes data by cryptographic means such as secret protections Can not pry property;And the latter is primarily referred to as user and Query Result is verified, prevent data to be tampered, forge or abandon.
Currently, researchers mainly consider that the safe retrieval under semi-honesty model (Honest-but-curious) framework is asked Topic, that is, assume that Cloud Server can come to provide data retrieval service to client in strict accordance with the agreement of agreement, but may steal Data message.The heat of existing research work concern is had become for the Privacy Protection of file retrieval in cloud computing environment Point problem, wherein, homomorphic cryptography technology is the conventional safe practice means of such research work with can search for encryption technology.So And, Cloud Server observes semi-honesty model not always necessarily, and Cloud Server may not provide data according to set agreement, Or the calculating process of data is the problems such as may be due to overload, software vulnerability and goes wrong, and causes to return to user's Retrieval result is incorrect or not comprehensive.Paid close attention to for retrieval result integrity issue is less by researcher, in fact, some Field, the integrity demands of retrieval result are particularly important, and data privacy is not essential sometimes.For example, being handed in security Easy field, any stock is all disclosed to valency fetched data, does not have private requirement, each user can To check these data;And can return and meet the correct and complete retrieval result of specific search modes requirement and be only user It is concerned about the most.As increasing government, enterprises and individuals are by the Data Hosting of oneself to Cloud Server, Cloud Server The retrieval result that is caused by attack is imperfect also increasingly to cause the concern of industry.Therefore, data privacy premise is not being considered Under, the integrality for how ensuring retrieval result is a major issue in cloud computing technology research and application.
The method having in the prior art is to provide to service this hypothesis according to " semi-honesty model " mode based on Cloud Server , it is impossible to result of calculation is imperfect caused by checking reduces the reasons such as computing cost due to system mistake or actively;Some structures Make verification code information complicated, and when data consumer retrieves Top-k documents, the verification code information redundancy of return is big, causes Communication efficiency and reconstruct checking code efficiency are all than relatively low.
The content of the invention
Towards cloud computing single keyword Top-k search methods are can verify that it is an object of the invention to provide a kind of.By this The method provided is invented, data consumer can verify to k document of retrieval result, so that it is determined that retrieval result is It is no to be tampered or abandon, determine the authenticity and integrity of result.
It is a kind of to can verify that single keyword Top-k search methods towards cloud computing, comprise the following steps:
Data owner constructs verification code information;For each keyword in keyword set, calculate in collection of document The degree of correlation and sequence of each document with the keyword, according to relevancy ranking sequential configuration verification code information;
Collection of document and verification code information are sent to Cloud Server by data owner, are retrieved for data consumer, described The process of the retrieval request of the Cloud Server processing data consumer is as follows:
The search instruction that S1, the cloud server are sent to the data consumer, the parameter of the search instruction The number of documents for needing to retrieve for specified collection of document, keyword and the data consumer;
S2, the Cloud Server calculate the document sets specified according to the collection of document specified and the keyword With the maximally related k document of the keyword in conjunction, the document is added in retrieval result set;
S3, judge whether the Top-k number of documents in the retrieval result set meets the document of data consumer's needs Quantity, if it is sends retrieval result collection of document and the corresponding verification code information of document to data consumer together;It is no Then return to step S2;
S4, data consumer receive the retrieval result collection of document that Cloud Server is returned, and carry out following operate:
S4-1, extract Top-k documents and verification code information;
Whether S4-2, the document checked in retrieval result are k, if it is continue executing with step S4-3;Otherwise retrieve Result verification fails, and retrieval result such as is tampered, abandoned at the attack, and Top-k is retrieved and verification process terminates;
The degree of correlation that S4-3, data consumer are calculated between the keyword that the retrieval result document returned and retrieval are used is obtained Divide and sort, according to the order reconstruct verification code information;
S4-4, data consumer compare verification code information and the obtained checking of reconstruct in the retrieval result of cloud service return Whether code information is equal, the retrieval result authentication failed if unequal, and retrieval result, which is tampered, abandoned etc., attacks, Top-k Retrieval and verification process terminate;Retrieval result is verified if equal, is true and complete retrieval result, is not passed through The attack such as distort, abandon, Top-k retrievals and verification process terminate.
The present invention also provide it is a kind of can verify that single keyword Top-k search methods towards cloud computing, comprise the following steps:
Collection of document and verification code information that cloud server data owner sends, described verification code information by with Lower step is obtained:For each keyword in keyword set, data owner calculates each document and institute in collection of document The degree of correlation and the sequence of keyword are stated, according to relevancy ranking sequential configuration verification code information;
Cloud server and the retrieval request of processing data user:
The search instruction that S1, the cloud server are sent to the data consumer, the parameter of the search instruction The number of documents for needing to retrieve for specified collection of document, keyword and the data consumer;
S2, the Cloud Server calculate the document sets specified according to the collection of document specified and the keyword With the maximally related k document of the keyword in conjunction, the document is added in retrieval result set;
S3, judge whether the Top-k number of documents in the retrieval result set meets the document of data consumer's needs Quantity, if it is sends retrieval result collection of document and the corresponding verification code information of document to data consumer together;It is no Then return to step S2;
S4, data consumer receive the retrieval result collection of document that Cloud Server is returned, and carry out following operate:
S4-1, extract Top-k documents and verification code information;
Whether S4-2, the document checked in retrieval result are k, if it is continue executing with step S4-3;Otherwise retrieve Result verification fails, and retrieval result such as is tampered, abandoned at the attack, and Top-k is retrieved and verification process terminates;
The degree of correlation that S4-3, data consumer are calculated between the keyword that the retrieval result document returned and retrieval are used is obtained Divide and sort, according to the order reconstruct verification code information;
S4-4, data consumer compare verification code information and the obtained checking of reconstruct in the retrieval result of cloud service return Whether code information is equal, the retrieval result authentication failed if unequal, and retrieval result, which is tampered, abandoned etc., attacks, Top-k Retrieval and verification process terminate;Retrieval result is verified if equal, is true and complete retrieval result, is not passed through The attack such as distort, abandon, Top-k retrievals and verification process terminate.
Beneficial effects of the present invention:
First, safety analysis
Present invention contemplates that the verifiability of clear data retrieval result, thus the inventive method security be can It is confirmatory.
, may not because Cloud Server observes semi-honesty model not always necessarily in Top-k retrievals and verification process Data are provided according to set agreement, or the calculating process of data goes out the problems such as may be due to overload, software vulnerability Existing mistake, causes the retrieval result for returning to user incorrect or not comprehensive.And this incomplete retrieval result wants to pass through The integrity verification of data consumer, it is necessary to change corresponding verification code information, but construct the HMAC that verification code information is used Key is shared by data consumer and data owner, and Cloud Server is maintained secrecy, and storage key is not known in Cloud Server In the case of, the complexity for cracking Top-k confirmation of secretarial document code information is equal to and cracks hmac algorithm complexity.Therefore, reasonable selection Hmac algorithm (such as SHA-256), it is ensured that Cloud Server can not crack the integrality of retrieval result without being used by data Person recognizes, so as to ensure data consumer to retrieval result Top-k document integrity verifications.
2nd, communication cost is analyzed
For the Top-k retrieval services towards cloud computing, the data that data consumer really needs are according to retrieval request Q =(DS, wq, k) return and wqMaximally related k collection of document, and the verification code information h returnedq,iIt is to be tied to ensure to retrieve The integrality of fruit Top-k documents, for the Top-k documents that data consumer really needs, hq,iBe in order to complete retrieval As a result integrity verification and necessary redundancy, therefore, while data consumer wishes to reach same security, identifying code Information will be lacked as far as possible.The present invention uses retrieval result redundancy δrWeigh verification code information length and account for return retrieval result overall length The ratio of degree.Redundancy is lower, and additional communication expense is smaller.If data consumer receives the retrieval knot of Cloud Server return Fruit data are<ds,h’>, understand that Cloud Server returns to k retrieval result document and 1 according to Top-k retrievals and verification portion Verification code information.Compared with the existing methods, because the verification code information of the invention returned is only comprising 1 HMAC information, and on Method is mentioned in review text to be needed to return to k HMAC information, if verification code information is constructed using SHA-256, is saved every time logical Letter expense is (k-1) × 256bit, so that the present invention is significantly reduced because addition verification code information is in Cloud Server and DU Between the redundancy communication cost brought.
3rd, verification code information reconstruct costing analysis
From communication cost analysis part, data consumer retrieves every time, and return is k maximally related documents and 1 Individual verification code information, verification code information is constructed based on HMAC.Weight is so only needed to after data consumer receives retrieval result 1 verification code information of structure, compared to original method, it is possible to reduce (k-1) secondary verification code information is built, therefore the invention enables The reconstruct cost of retrieval verification code information is effectively reduced every time.
Brief description of the drawings
Fig. 1 is that can verify that single keyword Top-k retrievals framework towards cloud computing;
Fig. 2 is the schematic flow sheet of data upload process;
Fig. 3 is the schematic flow sheet of Top-k retrievals and verification process.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, It is not intended to limit the present invention.
Top-k file retrievals are carried out according to single keyword under present embodiment research cloud environment, the k that checking high in the clouds is returned is individual Whether document is and retrieves the maximally related k document of keyword that uses, and this k document is not tampered with or abandoned.It is false If Cloud Server is designated as in CS, collection of document, comprising n document, being designated as DS={ D1,D2,…,Dn, in hot keyword set Comprising m keyword, W={ w are designated as1,w2,w3,…,wm}.Data owner is designated as DO, and data consumer is designated as DU, and g is The HMAC key that generation verification code information is used, g is shared by DO and DU, and CS is maintained secrecy.For keyword wqDocument DiTest Card code information is designated as hq,i, Score (wq,Di) represent wqAnd DiRelevance score,Represent document DiRelative to key Word wqThe degree of correlation be higher than document Dj, i.e. Score (wq,Di)>Score(wq,Dj).The query statement note that data consumer sends For Q=(DS, wq, k), represent to obtain and searching keyword w in collection of document DSqMaximally related k document.In addition, setting HMACg() is HMAC functions (such as SHA-256), and wherein g is key,Represent data cube computation operation.
In actual applications, k<<n.Clearly for any two different document DiAnd DjIf by the ID of document, created The information such as time take into account, then are able to ensure that DiAnd DjThe degree of correlation for search key is unequal.Therefore, if each in DS Document is for keyword wqThe degree of correlation there is strict partial ordering relation, i.e., for searching keyword wq, any two document and wq The degree of correlation it is all unequal, and size can be compared.
It can verify that single keyword Top-k search methods include data and uploaded and Top-k retrievals and checking towards cloud computing Two processes:
1st, data are uploaded
In order to realize the checking for being directed to retrieval result integrality, DO is when uploading collection of document data to CS, while attached Band associated verification code information.When DU obtains retrieval result collection of document, retrieval result can be verified using the verification code information Integrality.It shown below is the partial ordering relation construction identifying code letter using relevance score between document and search key The method of breath, and the detailed process that data are uploaded is provided based on this method, as shown in Figure 2.
(1) a keyword w is measured using word frequency (Term Frequency, TF)qAnd document DiThe degree of correlation, word frequency is anti- What is reflected is occurrence number of the word in single document, it is contemplated that the difference of Document Length, we standardize word frequency, obtain Keyword w and document DiRelatedness computation formula is:
Wherein, | Di| it is Document Length, Di,wIt is w in DiMiddle occurrence number.
(2) DS={ D are set1,D2,…,DnIn each document for keyword wqRelevance score sequence after obtainIt is document { D as follows1,D2,…,DnConstruct on wqVerification code information { hq,1,hq,2…, hq,n,
(3) according to the method in (2) to keyword set W={ w1,w2,…,wmIn each keyword, construct respectively For the verification code information of each document in DS, and by document and the corresponding verification code information for keyword together CS is uploaded to, i.e.,:
(4) CS receives and stored the data message that DO is sent.
2.Top-k is retrieved and verified
Top-k is retrieved and checking is main is completed by DU and CS cooperations, and DU sends search instruction to CS, and then CS is according to finger Order requires to perform retrieval process, and returns to correlated results, and last DU verifies the integrality of returning result, as shown in Figure 3.Specifically Process is as follows:
(1) DU is by search instruction Q=(DS, wq, CS k) is submitted to, CS returning result is then waited.
(2) CS receives Q, searches and includes keyword wqDocument code list, it is maximum by calculating relevance score Preceding k document, constitutes retrieval result collection of document R, if R={ D1,D2…,Dk, and for wqMeet Now CS is by R and verification code information hq,kDU is back to, i.e.,:
CS→DU:<R,hq,k>
(3) DU receives the results messages of CS returns<ds,h>, wherein ds is retrieval result collection of document, and h is identifying code Information, DU performs the following verification process for being directed to retrieval result:
1. check in ds and whether include k document, if | ds | turn verification step 2. if=k establishments, otherwise ds is discontented The retrieval result of sufficient integrity demands, retrieval is unsuccessfully exited;
2. ds={ d are set1,d2…,dk, for wqMeetNow DU is according to the key g shared with DO Reconstruct verification code informationIfSet up, then ds The correct retrieval result of integrity demands is as met, retrieves and successfully exits;Otherwise ds is unsatisfactory for integrity demands, retrieval failure Exit.
On the basis of explaination above flow, an exemplary embodiments are lifted.If collection of document DS={ D1,D2,D3,D4, it is crucial Set of words W={ w1,w2, for w1HaveSet up, for w2HaveSet up, it is therefore, right In w1For, D1、D2、D3And D4Corresponding verification code information is respectively With For w2For, D1、D2、D3And D4Corresponding verification code information is respectivelyWithIf DU sends retrieval request (DS, w to CS1, 3), then CS should return to R={ D1、 D2、D3AndThat is DS3(w1)={ D1,D2,D3, DU receives the result of CS returns, checks whether in R be 3 documents, is not passed through if it is not, then verifying;Otherwise reconstruct is checked h’1,3, check h '1,3And h1,3It is whether equal, if unequal, not by checking, pass through checking if equal.

Claims (2)

1. a kind of can verify that single keyword Top-k search methods towards cloud computing, it is characterised in that comprise the following steps:Number Verification code information is constructed according to owner;For each keyword in keyword set, calculate in collection of document each document with The degree of correlation of the keyword and sequence, according to relevancy ranking sequential configuration verification code information;
Collection of document and verification code information are sent to Cloud Server by data owner, are retrieved for data consumer, the cloud clothes The process for the retrieval request that business device handles the data consumer is as follows:
The search instruction that S1, the cloud server are sent to the data consumer, the parameter of the search instruction is finger Fixed collection of document, keyword and the data consumer needs the number of documents retrieved;
S2, the Cloud Server are calculated in the collection of document specified according to the collection of document specified and the keyword With the maximally related k document of the keyword, the document is added in retrieval result set;
S3, judge whether the Top-k number of documents in the retrieval result set meets the number of documents of data consumer's needs, If it is retrieval result collection of document and the corresponding verification code information of document are sent to data consumer together;Otherwise return Step S2;
S4, data consumer receive the retrieval result collection of document that Cloud Server is returned, and carry out following operate:
S4-1, extract Top-k documents and verification code information;
Whether S4-2, the document checked in retrieval result are k, if it is continue executing with step S4-3;Otherwise retrieval result Authentication failed, retrieval result such as is tampered, abandoned at the attack, and Top-k retrievals and verification process terminate;
Relevance score between the keyword that the retrieval result document and retrieval that S4-3, data consumer's calculating are returned are used is simultaneously Sequence, according to the order reconstruct verification code information;
S4-4, data consumer compare cloud service return retrieval result in verification code information and reconstruct obtain identifying code letter Cease whether equal, the retrieval result authentication failed if unequal, retrieval result such as is tampered, abandoned at the attack, Top-k retrieve and Verification process terminates;Retrieval result is verified if equal, is true and complete retrieval result, not by distorting, losing The attack such as abandon, Top-k retrievals and verification process terminate.
2. a kind of can verify that single keyword Top-k search methods towards cloud computing, it is characterised in that comprise the following steps:Cloud Server receives collection of document and the verification code information that data owner sends, and described verification code information is obtained by following steps Arrive:For each keyword in keyword set, data owner calculates each document and the keyword in collection of document The degree of correlation and sequence, according to relevancy ranking sequential configuration verification code information;
Cloud server and the retrieval request of processing data user:
The search instruction that S1, the cloud server are sent to the data consumer, the parameter of the search instruction is finger Fixed collection of document, keyword and the data consumer needs the number of documents retrieved;
S2, the Cloud Server are calculated in the collection of document specified according to the collection of document specified and the keyword With the maximally related k document of the keyword, the document is added in retrieval result set;
S3, judge whether the Top-k number of documents in the retrieval result set meets the number of documents of data consumer's needs, If it is retrieval result collection of document and the corresponding verification code information of document are sent to data consumer together;Otherwise return Step S2;
S4, data consumer receive the retrieval result collection of document that Cloud Server is returned, and carry out following operate:
S4-1, extract Top-k documents and verification code information;
Whether S4-2, the document checked in retrieval result are k, if it is continue executing with step S4-3;Otherwise retrieval result Authentication failed, retrieval result such as is tampered, abandoned at the attack, and Top-k retrievals and verification process terminate;
Relevance score between the keyword that the retrieval result document and retrieval that S4-3, data consumer's calculating are returned are used is simultaneously Sequence, according to the order reconstruct verification code information;
S4-4, data consumer compare cloud service return retrieval result in verification code information and reconstruct obtain identifying code letter Cease whether equal, the retrieval result authentication failed if unequal, retrieval result such as is tampered, abandoned at the attack, Top-k retrieve and Verification process terminates;Retrieval result is verified if equal, is true and complete retrieval result, not by distorting, losing The attack such as abandon, Top-k retrievals and verification process terminate.
CN201710225029.3A 2017-04-07 2017-04-07 Verifiable single keyword Top-k retrieval method facing cloud computing Active CN107194282B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710225029.3A CN107194282B (en) 2017-04-07 2017-04-07 Verifiable single keyword Top-k retrieval method facing cloud computing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710225029.3A CN107194282B (en) 2017-04-07 2017-04-07 Verifiable single keyword Top-k retrieval method facing cloud computing

Publications (2)

Publication Number Publication Date
CN107194282A true CN107194282A (en) 2017-09-22
CN107194282B CN107194282B (en) 2020-04-14

Family

ID=59871359

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710225029.3A Active CN107194282B (en) 2017-04-07 2017-04-07 Verifiable single keyword Top-k retrieval method facing cloud computing

Country Status (1)

Country Link
CN (1) CN107194282B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2365576A (en) * 2000-01-31 2002-02-20 Ibm Lightweight document clustering
US20110202526A1 (en) * 2010-02-12 2011-08-18 Korea Advanced Institute Of Science And Technology Semantic search system using semantic ranking scheme
CN104615692A (en) * 2015-01-23 2015-05-13 重庆邮电大学 Search encryption method supporting dynamic updating and multi-keyword safe ranking
CN104768149A (en) * 2015-03-17 2015-07-08 重庆邮电大学 Data privacy protection and completeness verification method based on Top-k inquiry in WSN

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2365576A (en) * 2000-01-31 2002-02-20 Ibm Lightweight document clustering
US20110202526A1 (en) * 2010-02-12 2011-08-18 Korea Advanced Institute Of Science And Technology Semantic search system using semantic ranking scheme
CN104615692A (en) * 2015-01-23 2015-05-13 重庆邮电大学 Search encryption method supporting dynamic updating and multi-keyword safe ranking
CN104768149A (en) * 2015-03-17 2015-07-08 重庆邮电大学 Data privacy protection and completeness verification method based on Top-k inquiry in WSN

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
CONG WANG ET.AL: ""Enabling Secure and Efficient Ranked Keyword Enabling secure and efficient ranked keyword search over outsourced cloud data"", 《IEEE TRANSACTIONS ON PARALLEL AND DISTRUIBUTED SYSTEMS》 *
CONG WANG ET.AL: ""Secure Ranked Keyword Search over Encrypted Cloud Data"", 《2010 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS》 *
戴华 等: ""面向隐私保护的两层传感网Top_k查询处理方法"", 《计算机研究与发展》 *

Also Published As

Publication number Publication date
CN107194282B (en) 2020-04-14

Similar Documents

Publication Publication Date Title
Liu et al. Verifiable Diversity Ranking Search Over Encrypted Outsourced Data.
CN103270516B (en) System and method for securing virtual machine computing environments
US9536067B1 (en) Password submission without additional user input
Ge et al. Enabling efficient verifiable fuzzy keyword search over encrypted data in cloud computing
EP3602457B1 (en) System and method for blockchain-based data management
CN100424704C (en) Full text search system based on ciphertext
CN106936771A (en) A kind of secure cloud storage method and system based on graded encryption
Zhang et al. Catch you if you misbehave: Ranked keyword search results verification in cloud computing
CN106407447A (en) Simhash-based fuzzy sequencing searching method for encrypted cloud data
CN103038750A (en) Systems and methods for securing data in motion
CN115314295B (en) Block chain-based searchable encryption technical method
CN103024035B (en) Safe and energy-saving encryption searching method based on mobile cloud platform
CN103095733A (en) Keyword cipher text retrieval method for cloud storage
CN108363689A (en) Secret protection multi-key word Top-k cipher text retrieval methods towards mixed cloud and system
US20190288833A1 (en) System and Method for Securing Private Keys Behind a Biometric Authentication Gateway
Wang et al. PeGraph: A system for privacy-preserving and efficient search over encrypted social graphs
Li et al. VRFMS: Verifiable ranked fuzzy multi-keyword search over encrypted data
Li et al. A blockchain-based credible and secure education experience data management scheme supporting for searchable encryption
Yang et al. A secure heuristic semantic searching scheme with blockchain-based verification
CN110149198A (en) A kind of autonomous system and method that safeguard protection and storage controllably are carried out to data
CN114118438A (en) Privacy protection machine learning training and reasoning method and system based on block chain
Abduljabbar et al. Secure biometric image retrieval in IoT-cloud
Zhang et al. A blockchain based searchable encryption scheme for multiple cloud storage
CN107194282A (en) It is a kind of to can verify that single keyword Top k search methods towards cloud computing
CN104009851B (en) A kind of bank net one-time pad two-way authentication secure log technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20170922

Assignee: NUPT INSTITUTE OF BIG DATA RESEARCH AT YANCHENG

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: X2020980007071

Denomination of invention: A verifiable single keyword Top-k retrieval method for Cloud Computing

Granted publication date: 20200414

License type: Common License

Record date: 20201026

EE01 Entry into force of recordation of patent licensing contract